Skip to main content

Sort by
Articles

Enterprises Tap Hybrid Cloud for Agile DevOps and Innovation

M. Sharon Baker

February 1, 2018

After years of talking about it, many large enterprises are making cloud deployments the centerpiece of an overall organizational transformation. Often, they take a hybrid approach that begins with DevOps. They are recognizing driving business innovation and better meeting shifting market demands requires significantly reduced development times and rethinking how developers innovate. They are also […]

Articles

Security Vulnerability Impacts POWER Processors

Rob McNelly

January 9, 2018

Rob McNelly explains how a security vulnerability affecting microprocessors requires firmware and OS patches for mitigation and protection.

Articles

An Application View of Data Is Important for a Point-in-Time Recovery

January 1, 2018

Hardly a week goes by without another report of data being stolen, lost or corrupted. Black hats working for organized crime or unfriendly governments often perpetrate these events, but many are the result of poor planning, carelessness or outright neglect. While most data centers with mainframe footprints have a disaster recovery (DR) strategy with a […]

Articles

A Cloud Managed Service Provider Can Help With Data Protection

Brett Martin

November 13, 2017

Data security is a critical component of a comprehensive risk management strategy. Organizations must analyze their security risk, taking into account factors such as industry, types of data being stored, the value of the data and the threats most likely to impact the business. Then they need to decide how much risk they’re willing to […]

Articles

The Future of IT

October 5, 2017

My grandmother never learned to drive. She was born around the time Henry Ford invented the production line and began rolling out Model Ts in vast numbers. Those cars were shipped to every corner of the world and quite a few made it to our shores here in New Zealand. Ours were painted black, too. […]

Articles

Use z/OS Resources and Tools for Data Protection

Patrick Fitzsimmons

October 2, 2017

The IBM z/OS* platform, with its unmatched reliability, availability and serviceability, outstanding I/O bandwidth and secure environment, provides an excellent platform for data protection. This is especially true if that client data already is on the mainframe, as the features of this hardware and software platform promote reliable and scalable data protection. If your organization […]

Articles

Top IT Concerns

Tom Huntington

September 11, 2017

We’ve heard it at trade shows and read about it in surveys: The top challenges for IBM Power Systems* clients are security, high availability and modernization. It’s no surprise because every CIO needs to keep their data safe and available in order to stay competitive—all while keeping the company’s name out of headlines covering the […]

Articles

IT Operational Analytics Tools Can Provide a View of Management Data

Allan Zander

August 1, 2017

IT and business management are increasingly concerned with the rising costs associated with their highly complex and ever-growing mainframe and distributed systems data centers. They are also concerned about controlling outages and mitigating the lack of transparency they have—including in their outsourced environments. Wide View Needed CIOs, IT managers and line-of-business managers don’t have unhindered […]

Articles

IBM Z Pervasive Encryption Marks a Paradigm Shift for Security

Evelyn Hoover

July 17, 2017

Trust is the currency that drives the new economy. It’s the foundation of digital relationships and demands security, transparency and greater value in every interaction and transaction. That’s among the reasons IBM equipped the new z14 system with pervasive encryption. Transitioning away from selective encryption to end-to-end protection helps organizations secure all of their enterprise […]

Articles

5 Points to Consider When Preparing for Backup and Recovery

Caroline L. Vitse

July 17, 2017

Planning for IT outages, whether instigated by Mother Nature, human error, system issues or a sly hacker, is no small feat for businesses. While the causes of unplanned outages vary, a strategy to manage outages can be standardized. Harry Batten, executive IT architect, IBM, lists five common points companies should consider while crafting a backup […]

Key Enterprises LLC is committed to ensuring digital accessibility for techchannel.com for people with disabilities. We are continually improving the user experience for everyone, and applying the relevant accessibility standards.